{"title":"The Chaotic Cipher Based on CNNs and Its Application in Network","authors":"Lei Lu, Lei Zhang","doi":"10.1109/IPTC.2011.54","DOIUrl":"https://doi.org/10.1109/IPTC.2011.54","url":null,"abstract":"This paper studied the chaotic cipher based on CNNs chaotic equation and its application in the network environment. Firstly, a improve method for CNNs chaotic properties was given, the variables which has better statistic property and more sensitive to the system parameter be get to generate binary sequence for encrypt. And then, for applying chaotic cipher in network environment, the synchronization method based on the state variables transmission mechanism was proposed, this method can solve the synchronization problem of chaotic stream cipher, and the simulation test results confirm the validity. At last, a chaotic cryptosystem key distribution strategy in network environment was designed.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133011918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Self Adaptive Jamming Strategy to Restrict Covert Timing Channel","authors":"Xiong Liu, Haiwei Xue, Yiqi Dai","doi":"10.1109/IPTC.2011.8","DOIUrl":"https://doi.org/10.1109/IPTC.2011.8","url":null,"abstract":"Covert timing channel may compromise multi-level security system, it's necessary to eliminate or restrict them. Jamming covert timing channel is a main method to restrict the channel's capacity, but existing works' jamming strategies don't take the packets arriving rate and queue's length into account, the jamming strategies they use may affect the overt channel's availability. This paper proposes a self adaptive jamming strategy which can adjust the service time according to the packets' arriving rate and the queue's length. The experiment result shows that the new strategy can effectively restrict the covert timing channel and keep the availability of the overt channel.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131161192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Analysis on Direct Anonymous Attestation for Security Chip","authors":"Yu Qin, Qiuxin Wu, XiaoBo Chu","doi":"10.1109/IPTC.2011.11","DOIUrl":"https://doi.org/10.1109/IPTC.2011.11","url":null,"abstract":"Direct Anonymous Attestation (DAA) is an anonymous protocol designed for TPM/TCM or other embedding devices. Recently, DAA schemes based on the pairing continues to advance rapidly, but it has a certain problems to put the scheme into application. This paper focuses on the practicability and feasibility for the design of the pairing DAA protocol and system. Our first contribution in this paper is presenting a pairing less DAA scheme for TCM, only 2 pairings required in the whole protocol, Furthermore no pairing computation required inside TCM. The second contribution is to design and implement a test platform prototype for analyzing and evaluating the pairing DAA scheme. We analyze the influence factors like elliptic curve selection, preprocessing and so on. The experiment results show that the trade-off between the security strength and the performance must be taken into the comprehensive consideration for pairing DAA design.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122591449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Digital Library Technology Research Based on VPN","authors":"Kuobin Dai","doi":"10.1109/IPTC.2011.49","DOIUrl":"https://doi.org/10.1109/IPTC.2011.49","url":null,"abstract":"The use of digital library services within the network and the external aspects, analysis of university library network security risks faced by the hardware, software, security risk, technical risk, management risk and the risk of external attacks and other major security risk. Combination of network security technologies, were put forward their own coping strategies. Focus on analysis of hacker attacks and network viruses control methods, including the use of anti-virus protection software, the use of firewall technology, encryption and authentication technology, intrusion detection, VLAN technology, content inspection and monitoring technology, and virtual honey pot technologies. Library network systems only to achieve security of the nature of the equipment, Network technology, professional and management standardization, in order to effectively avoid the risk of a variety of network security and ensure the normal operation of network systems, research on prevention and control of universities Digital library network security risks with a reference and guide.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117234627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust Based Secure Localization in Wireless Sensor Networks","authors":"Ting Zhang, Jingsha He, Yang Zhang","doi":"10.1109/IPTC.2011.21","DOIUrl":"https://doi.org/10.1109/IPTC.2011.21","url":null,"abstract":"Secure localization in wireless sensor networks (WSNs) has received a great deal of attention with the increasing applications of wireless sensors. Security issues of localization in WSNs need to take into account attacks from both external and internal nodes. In this paper, we propose a secure localization scheme based on trust evaluation called trust based secure localization (TBSL) to evaluate the trust of beacon nodes through detecting the identity and the behavior of such node and using the credible position information for localization in WSNs. Simulation results show that our proposed scheme can improve the accuracy of localization in a hostile environment.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132160958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Summarization for Chinese Text Based on Sub Topic Partition and Sentence Features","authors":"Xueming Li, Jiapei Zhang, Minling Xing","doi":"10.1109/IPTC.2011.40","DOIUrl":"https://doi.org/10.1109/IPTC.2011.40","url":null,"abstract":"With the explosion of electronic information on web, there is the increasing requirement to obtain the information needed accurately and efficiently. In this article, a method of automatic summarization based on sub topic partition and sentence features is proposed, in which the sentence weight is computed based on LexRank algorithm combining with the score of its own features in every sub topic, such as its length, position, cue words and structure. In addition, we reduce redundancy of candidate sentence collection. With evaluation on six different genres of data sets, our method could get more comprehensive and high-quality summarization with less redundancy than the original LexRank algorithm.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"24 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114108211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applied Study on Information Technology and College English Teaching Integration","authors":"Jinfeng Wang","doi":"10.1109/IPTC.2011.66","DOIUrl":"https://doi.org/10.1109/IPTC.2011.66","url":null,"abstract":"The popularity of modern information technology makes it urgent to construct a new English teaching model based on the integration of technology and teaching. Such integration targets at improving the traditional teaching mode, representing a trend in the curriculum reform home and abroad. This paper aims at information technology and college English teaching integration, analyzing the importance and efficient measures for the implementation and spread of new and efficient teaching model and methods.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122313947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-feature Method: An Integrated Content Based Image Retrieval System","authors":"Chen Liu, Zhou Wei","doi":"10.1109/IPTC.2011.18","DOIUrl":"https://doi.org/10.1109/IPTC.2011.18","url":null,"abstract":"The process of retrieving desired or similar images from a large collection of images on the basis of features is referred as Content Based Image Retrieval (CBIR). In this paper, a integrated CBIR system is proposed using combined features and weighted similarity. The features include visual features of color, texture and shape and key text metadata. Some experimental simulations have been presented to show the accuracy and efficiency of the proposed retrieval method.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129605747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust Control of One Arm Space Manipulator with Parameters Uncertainties Compensated","authors":"Guangyan Xu, Meng Zhang","doi":"10.1109/IPTC.2011.60","DOIUrl":"https://doi.org/10.1109/IPTC.2011.60","url":null,"abstract":"According to trajectory tracking control of space robot with parameters uncertainties, the influence of uncertain items on space robot trajectory tracking is taken into consideration. Robust controller based on robust control theory of uncertain systems is designed for the space robot and uncertain items are compensated. Firstly, robust controller is applied to compensate the coriolis force, centrifugal force and other disturbance. Robust control law with items uncertainties compensated is improved and it can meet the demand for control law non-singular. The desired time-varying trajectory can be real-time tracked by manipulators while the attitude of space robot can be controlled. The compensation matrix is proposed. The uncertainty item range can be solved based on PSO and it can be applied to control manipulators. Stability of the improved robust controller is analyzed by Lyapunov function. Finally, the simulation results show that the robust controller has a good performance.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117164207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on QoS Protection Mechanism of VoIP Systems","authors":"Chunxia Tu","doi":"10.1109/IPTC.2011.45","DOIUrl":"https://doi.org/10.1109/IPTC.2011.45","url":null,"abstract":"This paper describes the principles of QoS communications, analysis the requirements of how voip to provide QoS guarantees, clarify the major problems it's facing now. And proposes the solution to the problem of latency, jitter, packet loss and echo effects, with the same time introduces several of the QoS model that can improve the qos of voip, discusses their respective advantages and shortcomings, ultimately concludes that no single technology and models can effectively solve the QOS issues of the VoIP system, application of an integrated QoS solution is the only effectively way to solve this problem.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134233389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}